Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Spring 2014 Schedule
Edit
11
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Spring 2014 Schedule
Date
Chapter
Coverage
Readings
Assignment
Due Date
01/09/2014
Introduction
01/16/2014
Readings
Read the
Threat Environment
articles and be prepared to discuss in class.
01/23/2014
Chapter 1
The Threat Environment
01/30/2014
Chapter 2
Planning & Policy
We will be discussing an alternative Risk Assessment method OCTAV Alegro, you can read more
here
.
02/06/2014
Module A
Networking Concepts
02/13/2014
Chapter 3
Cryptography
Read the
Cryptography Readings
from the
Class Readings
page
02/20/2014
Chapter 4
Secure Networks
02/22/2014
to
02/26/2014
Exam 1 (Chapter 1-4, Module A, Readings)
02/27/2014
Chapter 5
Access Controls
03/06/2014
Spring Break
03/13/2014
Readings
Passwords
Read the required readings from the Password section of the
Class Readings
Access Control Simulation Report
03/27/2014
03/18/2014
Withdrawal Deadline
03/20/2014
Chapter 6
Firewalls
03/27/2014
Chapter 7 & 8
Host Hardening & Application Security
Read the required Application Hardening articles section of the
Class Readings
04/03/2014
Chapter 9 & 10
Data Protection & Incident and Disaster Response
Security in the News
04/10/2014
04/10/2014
Readings
SOX IT Readings &
COSO, COBIT, ERM
This article discusses the Board's role in cybersecurity from a governance perspective:
TCB_DN-V6N6-141.pdf
Details
Download
450 KB
(Clarke and Olcott, 2014)
Read the required readings from the IT Control and SOX section of the
Class Readings
From the
Frameworks & Standards
page, read:
Internal Control - Integrated Framework (1992)
Internal Control - Integrated Framework (2011 Exposure Draft)
coso_draft_internal control framework.pdf
Enterprise Risk Management - Integrated Framework (2004)
COBIT 4.1
CobiT_4.1.pdf
Which one to go with ISO27001 or Cybersecurity Framework
04/17/2014
Readings
Additional Readings
Cyberattack's abound yet companies tell SEC losses are few
By
Chris Strohm, Eric Engleman and Dave Michaels
-
Apr 3, 2013)
CF Disclosure Guidance: Topic No. 2
S.E.C. (
This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents)
SEC Cybersecurity Roundtable Archive Webcast
SEC OCIE Cybersecurity Initiative (April 15, 2014)
Cybersecurity Risk Alert & Appendix - 4.15.14.pdf
Details
Download
295 KB
AICPA Top 5 Cybercrimes (2013)
Top-5-CyberCrimes.pdf
Details
Download
5 MB
ERM for cloud computing (COSO)
2012 Chan.pdf
Details
Download
6 MB
04/19/2014
to
04/24/2014
Final Exam (5-10) and Readings
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Spring 2014 Schedule
to
02/26/2014
COSO, COBIT, ERM
Read the required readings from the IT Control and SOX section of the Class Readings
From the Frameworks & Standards page, read:
to
04/24/2014